{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:46:51Z","timestamp":1771548411575,"version":"3.50.1"},"publisher-location":"India","reference-count":16,"publisher":"Springer India","isbn-type":[{"value":"9788132204862","type":"print"},{"value":"9788132204879","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-81-322-0487-9_97","type":"book-chapter","created":{"date-parts":[[2012,4,14]],"date-time":"2012-04-14T07:13:23Z","timestamp":1334387603000},"page":"1061-1071","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Application of Binary Particle Swarm Optimization in Cryptanalysis of DES"],"prefix":"10.1007","author":[{"given":"Shimpi Singh","family":"Jadon","sequence":"first","affiliation":[]},{"given":"Harish","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Etesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Jagdish Chand","family":"Bansal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,15]]},"reference":[{"issue":"1","key":"97_CR1","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.asoc.2008.04.016","volume":"9","author":"M.S. Arumugam","year":"2009","unstructured":"Arumugam, M.S., Rao, M.V.C., Tan, A.W.C.: A novel and effective particle swarm optimization like algorithm with extrapolation technique. Applied Soft Computing\u00a09(1), 308\u2013320 (2009)","journal-title":"Applied Soft Computing"},{"issue":"1","key":"97_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. Journal of CRYPTOLOGY\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of CRYPTOLOGY"},{"key":"97_CR3","unstructured":"Clerc, M.: The swarm and the queen: towards a deterministic and adaptive particle swarm optimization. In: Proceedings of the 1999 Congress on Evolutionary Computation, CEC 1999, vol.\u00a03. IEEE (1999)"},{"issue":"1","key":"97_CR4","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1016\/j.amc.2006.10.047","volume":"188","author":"M. Thakur","year":"2007","unstructured":"Thakur, M., Deep, K.: A new crossover operator for real coded genetic algorithms. Applied Mathematics and Computation\u00a0188(1), 895\u2013911 (2007)","journal-title":"Applied Mathematics and Computation"},{"issue":"6","key":"97_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.E.: Special feature exhaustive cryptanalysis of the nbs data encryption standard. Computer\u00a010(6), 74\u201384 (1977)","journal-title":"Computer"},{"key":"97_CR6","unstructured":"Dorigo, M., Di Caro, G.: Ant colony optimization: a new meta-heuristic. In: Proceedings of the 1999 Congress on Evolutionary Computation, CEC 1999, vol.\u00a02. IEEE (1999)"},{"key":"97_CR7","unstructured":"Eberhart, R.C., Shi, Y.: Comparing inertia weights and constriction factors in particle swarm optimization. In: Proceedings of the 2000 Congress on Evolutionary Computation, vol.\u00a01, pp. 84\u201388. IEEE (2000)"},{"key":"97_CR8","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks, vol.\u00a04, pp. 1942\u20131948. IEEE (1995)"},{"key":"97_CR9","unstructured":"Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: IEEE International Conference on Systems, Man, and Cybernetics, \u2019Computational Cybernetics and Simulation\u2019, vol.\u00a05, pp. 4104\u20134108. IEEE (1997)"},{"issue":"5-7","key":"97_CR10","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.na.2004.12.017","volume":"63","author":"E.C. Laskari","year":"2005","unstructured":"Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Evolutionary computation based cryptanalysis: A first study. Nonlinear Analysis\u00a063(5-7), e823\u2013e830 (2005)","journal-title":"Nonlinear Analysis"},{"issue":"1","key":"97_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jsir.2010010101","volume":"1","author":"K.M. Passino","year":"2010","unstructured":"Passino, K.M.: Bacterial foraging optimization. International Journal of Swarm Intelligence Research (IJSIR)\u00a01(1), 1\u201316 (2010)","journal-title":"International Journal of Swarm Intelligence Research (IJSIR)"},{"key":"97_CR12","volume-title":"Differential evolution: a practical approach to global optimization","author":"K.V. Price","year":"2005","unstructured":"Price, K.V., Storn, R.M., Lampinen, J.A.: Differential evolution: a practical approach to global optimization. Springer, Heidelberg (2005)"},{"key":"97_CR13","unstructured":"Shi, Y., Eberhart, R.: A modified particle swarm optimizer. In: The 1998 IEEE International Conference on Evolutionary Computation Proceedings, IEEE World Congress on Computational Intelligence, pp. 69\u201373. IEEE (1998)"},{"key":"97_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/BFb0040810","volume-title":"Evolutionary Programming VII","author":"Y. Shi","year":"1998","unstructured":"Shi, Y., Eberhart, R.: Parameter Selection in Particle Swarm Optimization. In: Porto, V.W., Waagen, D. (eds.) EP 1998. LNCS, vol.\u00a01447, pp. 591\u2013600. Springer, Heidelberg (1998)"},{"issue":"11","key":"97_CR15","doi-asserted-by":"crossref","first-page":"916","DOI":"10.7326\/0003-4819-110-11-916","volume":"110","author":"D.F. Williamson","year":"1989","unstructured":"Williamson, D.F., Parker, R.A., Kendrick, J.S.: The box plot: a simple visual method to interpret data. Annals of Internal Medicine\u00a0110(11), 916 (1989)","journal-title":"Annals of Internal Medicine"},{"issue":"3","key":"97_CR16","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cie.2007.08.003","volume":"54","author":"B. Yagmahan","year":"2008","unstructured":"Yagmahan, B., Yenisey, M.M.: Ant colony optimization for multi-objective flow shop scheduling problem. Computers & Industrial Engineering\u00a054(3), 411\u2013420 (2008)","journal-title":"Computers & Industrial Engineering"}],"container-title":["Advances in Intelligent and Soft Computing","Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-0487-9_97","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T06:34:43Z","timestamp":1675751683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-0487-9_97"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9788132204862","9788132204879"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-0487-9_97","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"value":"1867-5662","type":"print"},{"value":"1867-5670","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"15 April 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}